{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:47:10Z","timestamp":1725486430502},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387382661"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-38269-2_18","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T05:00:45Z","timestamp":1181365245000},"page":"173-180","source":"Crossref","is-referenced-by-count":6,"title":["Trust Building for Enhancing Collaboration in Virtual Organizations"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n","family":"Mezgar","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"Proceedings of CHI2002","author":"N.D. Bos","year":"2002","unstructured":"Bos, N.D., Olson, J.S., Gergle, D., Olson, G.M., & Wright, Z.(2002). Effects of four computer-mediated channels on trust development. In Proceedings of CHI2002. New York: ACM Press."},{"unstructured":"Cheskin, (1999), eCommerce Trust, A joint research study with Studio Archetype\/Sapient and Cheskin,January,http:\/\/www.cheskin.com\/p\/ar.asp?mlid=7&arid=l0&art=0","key":"18_CR2"},{"unstructured":"D\u2019Hertefelt, S. (2000). Trust and the perception of security, http:1\/w.interactionarchitect.com\/research\/report20000103 shd.htm","key":"18_CR3"},{"key":"18_CR4","volume-title":"Trust-The social virtues and the creation of prosperity","author":"F. Fukuyama","year":"1995","unstructured":"Fukuyama, Francis, (1995). Trust-The social virtues and the creation of prosperity, The Free Press, New York,."},{"issue":"3","key":"18_CR5","first-page":"40","volume":"73","author":"C. Handy","year":"1995","unstructured":"Handy, C. (1995). Trust and the virtual organization, Harvard Business Review. 73(3), 40\u201350.","journal-title":"Harvard Business Review"},{"unstructured":"Harrison, D., McKnight N. and L. Chervany. (1996), \u201cThe Meanings of Trust\u201d University of Minnesota Management Information Systems Research Center (MISRC), Working Paper. 96\u201304.","key":"18_CR6"},{"unstructured":"Himmelman, A.T. (1997). Devolution as an experiment in citizen governancy: Multi-organizational partnerships and democratic revolutions, Working Paper for the Fourth International Conference on Multi-Organizational Partnerships and Cooperative Strategy Oxford University, 8\u201310 July 1997, Retrieved October 16, 2004, from Community Building Resource Exchange Web site:http:\/\/w.commbuild.orgldocumentsihimmdevo.html.","key":"18_CR7"},{"issue":"6","key":"18_CR8","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1287\/orsc.10.6.791","volume":"10","author":"S.L. a. Jarvenpaa","year":"1999","unstructured":"Jarvenpaa, S.L. andD.E. Leidner. (1999).Communication and Trust in Global Virtual Teams,Organization Science, 10(6), 791\u2013815.","journal-title":"Organization Science"},{"unstructured":"Luhman, N. (1979). Trust and power. Chichester: Wiley.","key":"18_CR9"},{"issue":"l","key":"18_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2307\/256727","volume":"38","author":"D.J. McAllister","year":"1995","unstructured":"McAllister, D.J. (1995). Affect-and cognition-based trust as foundations for interpersonal cooperation in organizations, Academy of Management Journal, 38, l, 24\u201359.","journal-title":"Academy of Management Journal"},{"unstructured":"Menezes, A.P. van Oorschot,and S. Vanstone, (1996). Handbook of Applied Cryptography, CRC Press.","key":"18_CR11"},{"key":"18_CR12","volume-title":"Handbook of Human-Computer Interaction","author":"S. Oviatt","year":"2002","unstructured":"Oviatt, S., (2002) Multimodal Interfaces, in Handbook of Human-Computer Interaction, (ed.J. Jacko & A. Sears),Chapter 14, Lawrence Erlbaum: New Jersey, 2002."},{"unstructured":"Rocco, E., Finholt, T.A., Hofer, E.C., & Herbsleb, J.D. (2001, April). Out of sight, short of trust, Presentation at the Founding Conference of the European Academy of Management. Barcelona,Spain.","key":"18_CR13"},{"key":"18_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"D.M. Rousseau","year":"1998","unstructured":"Rousseau, D.M., Sitkin, S.B., Burt, R.,and Camerer, C. (1998), Not so different after all: A cross-disciplinary view of trust. Academy of Management Review, 23,1\u201312.","journal-title":"Academy of Management Review"},{"unstructured":"Schneier, B. (1996). Applied Cryptography. John Wiley & Sons, Inc.","key":"18_CR15"},{"doi-asserted-by":"crossref","unstructured":"Zheng, J., Veinott, E, Bos, N., Olson, J.S., Gary,Olson, G.M. (2002). Trust without touch: jumpstarting long-distance trust with initial social activities, Proceedings of the SIGCHI conference on Human factors in computing systems, Minneapolis, Minnesota, USA, Pages: 141\u2013146, ISBN:1-58113-453-3.","key":"18_CR16","DOI":"10.1145\/503376.503402"}],"container-title":["IFIP International Federation for Information Processing","Network-Centric Collaboration and Supporting Frameworks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-38269-2_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T09:46:01Z","timestamp":1683884761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-38269-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387382661"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-38269-2_18","relation":{},"subject":[]}}